Name | Modified | Size | Downloads / Week |
---|---|---|---|
Parent folder | |||
DcsFV_04.zip | 2023-12-10 | 668.5 kB | |
DcsFV_04.zip.sig | 2023-12-10 | 310 Bytes | |
DcsFV_src.zip | 2023-12-03 | 18.1 kB | |
readme.md | 2017-11-12 | 3.0 kB | |
DcsProp.example | 2017-08-27 | 6.8 kB | |
DcsFV_03.zip | 2017-07-22 | 1.0 MB | |
DcsFV_03.zip.sig | 2017-07-22 | 287 Bytes | |
disk_encryption_v1_2.pdf | 2017-07-05 | 135.0 kB | |
dcs_tpm_owner_02.pdf | 2017-04-15 | 134.7 kB | |
DcsWinCfg_02.zip | 2017-04-08 | 974.0 kB | |
DcsWinCfg_02.zip.sig | 2017-04-08 | 287 Bytes | |
veracrypt-1.19-setup-gui-armv7 | 2017-03-28 | 3.7 MB | |
DCS-2017_03_28.zip | 2017-03-28 | 30.9 MB | |
DCS-2017_03_28.zip.sig | 2017-03-28 | 287 Bytes | |
Totals: 14 Items | 37.6 MB | 12 |
This is preview only. (signed by DCS_sign, driver from BETA2)
The latest binaries: DCS-2017_03_28.zip
To create first release of Disk Cryptography Services we need to buy signature to sign binaries and company registered.
Bitcoins address: 14qca7Fbj5MVb8ybTGUntsuk7etD9eow6r details
discussion
Important documents
- disk_encryption_v1_1a.pdf - intro how to encrypt in EFI: full disk, hidden OS, create separate authorization USB with keys
- DcsPkg\DcsProp.example - configuration file for EFI boot loader with parameters explained
- DcsFV\DcsFV.cfg - configuration for find volume tool with parameters explained
- DcsFV\Statistics_example.pdf - graphics of statistics parameters(entropy, motecarlo etc) for 256 sectors(zero data) VearCrypt encrypted (different keys and algorithms) to evaluate encrypted region search dcsfv.cfg configuration.
Demo
http://sendvid.com/px9jirm6
scenario of the demo:
1. OS key on vbox_hiddenos_key.vhd
2. key connected -> password request -> password from encrypted OS (veraen) -> boot OS from disk 1
3. key connected -> password request -> password from hidden OS (verahid) -> boot OS from disk 2
4. OS key disconnected -> boot Linux
Notes:
Button PLT lck/"TPM lck" It adds platform/TPM key file to password (BIOS id and USB id if available or key from TPM)
GPT on disk 2 contains the only MS reserved partition with hidden OS. It is possible to mount it from VeraCrypt but the MSR partition is not visible from Windows Disk Manager
Change list
-
VeraCrypt 1.20 Beta2 patches :)
== Patch 1 ==
Better check of EFI boot problems for HP notebooks
TPM 1.2 support
PasswordTimeout and many other options for EFI boot system encryption. Details in DcsProp.example (Picture password, two factors authorization etc.)
DcsProp edit in system settings configuration
PlatformInfo generation to check graphical modes and other parameters.
== Patch 2 (28.03.2017) ==
parameter /mountoption title=<>
Free PIM
Links updated
DcsPkg update -
DcsFV - find volume encrypted. To scan file or disk sectors range for volume VeraCrypt encrypted
Two possibilities: slow and fast
Slow - bruteforce several passwords on each sector in media range selected.
Fast - check statistics parameters for each sector in range
Details in DcsFV.cfg -
DcsWinCfg - to configure DcsProp from command line and calculate RUD
(27.03.2017)
Multiple hidden volumes inside container encrypted. Details: DcsWinCfg_01 (readme.txt) -
DcsPkg - EFI boot loader and Secure boot configuration script
(27.03.2017)
simplified hidden OS install ( DcsCfg -oshideprep )
smart card test possibility ( DcsCfg -us <usb> -scapdu XXXXX )